Resources

Blog

WAFs Add Layer of Security When Using Web-based Apps

Image If your organization uses any web applications to conduct essential business functions to boost productivity and collaboration, and provide an easy, customer friendly way to deliver services, you should consider solutions that incorporate a WAF, or Web Application Firewall. A WAF is a firewall specifically targeting the...
Blog

Secure Cloud File Transfers: Best Practices for Organizations

Image In today's data-driven world, organizations increasingly rely on the cloud to transfer files securely and efficiently. Whether you are working in a pure cloud environment, a hybrid setup, or leveraging Managed File Transfer as a Service (MFTaaS), ensuring the security of your file transfers is paramount. In this blog, we'll...
Blog

Considerations for Cloud File Transfers

Image Whether your organization is debating on moving your file transfer process entirely to the cloud, adopting a hybrid environment, or using a hosted SaaS solution, review the considerations below to help better clarify and get the organizational support needed for a cloud-based file transfer solution.  There are no absolute right...
Article

How to Integrate Salesforce with Your File Transfers

With the GoAnywhere Salesforce Cloud Connector, you can automate the creation and deletion of accounts, manage contacts, cases, leads, and perform various Salesforce-supported CRM functions. In this tutorial, you will learn how to convert a CSV file with prospect or customer contact information and insert those new records directly in Salesforce. While this example uses a CSV...
Article

Automating Project Workflows

Learn the three fastest ways to automate Project workflows in GoAnywhere MFT using Schedules, Monitors and Triggers.
Article

How to Query a Database and Write the Data to JSON

Connect to and query a wide variety of database servers including MySQL, Microsoft SQL Server, PostgreSQL, Derby, Oracle, and DB2. Then, write data to the JSON file format.
Guide

The GoAnywhere Book of Secure File Transfer Project Examples

IT and cybersecurity teams frequently envision, create, and implement innovative uses for their secure file transfer software. These unique applications allow them to solve critical industry and organizational needs without using a secondary solution or tool! In "The GoAnywhere Book of Secure File Transfer Project Examples," you'll discover countless ways your peers use MFT in...
Guide

Think Like a Hacker and Secure Your Data

Data security incidents increase every year. In response, IT teams play defense. They create plans that tell them what to secure and how to react if their security settings fail. But it’s not enough to respond to a data breach. Resources like incident response plans and compliance guidelines can’t predict what hackers are after or how they plan to acquire your data. What if...
Guide

The Role MFT Plays in Vendor Management

Anytime you're working with vendors and other third parties, you open the door to potential threats to the security of the information you exchange, even when working with an established relationship. Take a few minutes to learn more about securing your critical and valuable customer information and other data with a robust managed file transfer (MFT) solution. Discover how...
Guide

PCI DSS Compliance with Managed File Transfer

Leading edge IT shops are rethinking the use of underlying components within their data transfer arsenals, and are arming themselves to comply with ever changing compliance requirements, including PCI DSS. Download the white paper to examine how a Managed File Transfer (MFT) solution can help your company stay ahead of PCI compliance requirements with data transfers. This PCI...
Guide

How Managed File Transfer Addresses HIPAA Requirements for ePHI

As the healthcare industry transitions from primarily using paper documents and patient charts to electronic health records (EHR), the need for a secure and reliable method of sharing electronic protected health information (ePHI) has increased. Get the guide to learn how a managed file transfer solution can help meet HIPAA's PHI requirements and protect your organization...
Guide

How's Your File Transfer Process Running?

Without the right secure file transfer solution in place, transferring files person-to-person or server-to-server can sometimes feel like being behind the wheel of an outdated clunker on a long road trip to nowhere. In record time, GoAnywhere MFT can help rev up your file transfers and accelerate your solution without hitting any roadblocks. This detailed guide will help you...
Guide

HIPAA Data Security Best Practices

Working in partnership with HealthIT Security, Fortra compiled and curated this informative white paper on the top technical, administrative, and policy expectations stemming from HIPAA. Gain a strong understanding of the types of privacy and security measures that the Department of Health & Human Services (HHS) and Office for Civil Rights (OCR) will be looking for so your...
Guide

How Do Managed File Transfer (MFT) Vendors Stack Up to Each Other?

Get a holistic view of the managed file transfer (MFT) landscape with G2’s MFT Grid Report. Download G2’s MFT Grid Report for an in-depth analysis of vendors in the MFT market space, covering: Satisfaction Ratings of the top MFT vendors based on user reviews of sellers’ ability to satisfy their needs. See how vendors like GoAnywhere MFT, Cleo, MOVEit and 9 more compare. ...
Guide

Five Ways to Improve ePHI for HIPAA/HITECH with Managed File Transfer

The healthcare industry is under increasing pressure to make health information more accessible to both patients and healthcare providers, while simultaneously ensuring that patient data remains private and secure. Managed File Transfer (MFT) solutions can provide the security, control, and visibility that can help the healthcare industry address the current challenges related...
Guide

Defending Against Data Breach

Data breach incidents are not a temporary statistical aberration, but instead represent a growing epidemic. Given the cost to both companies and their customers, it’s critical that IT teams develop a solid strategy that utilizes the most effective tools when planning to prevent a data breach. Download this data breach guide to: Examine the problems that are creating higher...
Guide

Buyer's Guide: Secure Managed File Transfer

We know finding the right file transfer solution for your organization isn’t an easy process. There are dozens of details to consider, from industry and compliance concerns to critical cybersecurity needs, and they can make choosing a vendor complex. In this ultimate buyer’s guide, you’ll find the information you need to successfully evaluate different managed file transfer...
Blog

The Surprising Relationship Between Data Privacy Laws and File Sharing

  Image Location, location, location. Not just the mantra of realtors and would-be buyers – it’s also a concern for data security professionals world-wide. As cloud computing has ramped up across industries, the physical location of stored data has been called into question, alongside concerns stemming from data privacy laws. Read...
Blog

Is it Time for a Scalable File Transfer Solution?

  Image One size does not fit all. If your file transfer needs and requirements have changed over the years, or even months, it’s time to consider a scalable managed file transfer (MFT) solution. Still Using Manual Scripts? Scale Up. If your IT team is still creating scripts and programs to handle your file transfers and constantly...
Blog

What is Ransomware-as-a-Service (RaaS)?

  Image   What is Ransomware-as-a-Service (RaaS)?   Ransomware-as-a-Service (RaaS) is a new pay-for-use business model used by ransomware developers where malicious actors (known as affiliates) can outsource or lease already-developed ransomware attacks the same way legitimate software developers lease Software-as-a-Service (SaaS)...